The Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert describing their Cybersecurity Initiative. The SEC initiative focuses on what they define as the core components for ensuring thorough network environmental security. The SEC Risk Alert dashboard assists organizations in evaluating and improving their cybersecurity preparedness according to the standards found in Tenable’s SEC Risk Alert Reference Guide.
The SEC Risk alert has seven key requirements:
- Maintain accurate inventories
- Maintain knowledge of normal operations
- Discover vulnerabilities and track remediation progress
- Prevent unauthorized activity
- Monitor for malicious activity
- Monitor for data loss
- Measure compliance
The SEC Risk Alert dashboard assists organizations with achieving these goals. Tenable’s SecurityCenter allows a single console to administer continuous active scanning, passive detection, log analysis, vulnerability management, and compliance checking across an organization. Because SecurityCenter is completely scalable and customizable, dashboards and reports can be fine-tuned to deliver the most advanced analysis of cybersecurity risks.
The vulnerability data components offer insight into which hosts can be exploited and which vulnerabilities pose the greatest current threat to organizational security. The compliance related components show how many hosts adhere to the standards with which the organization has agreed to comply. Compliance adherence insight enables management to understand whether the scope and breadth of the configuration meets their business needs. Lastly, the event trending data on this dashboard is aimed at informing managers how many new devices are connected on a regular basis. New device information helps managers comprehend the rate at which new hardware is being deployed over time.
This dashboard is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboard can be easily located in the SecurityCenter Feed under the Discovery & Detection category. The dashboard requirements are:
- SecurityCenter 5.5.x
- Nessus 6.11.x
- LCE 5.x
- NNM 5.4.x
- LCE Client - Tenable NetFlow Monitor
Tenable SecurityCenter Continuous View® (SecurityCenter CV™) provides continuous network monitoring, vulnerability identification and security monitoring. SecurityCenter CV™ is continuously updated with information about advanced threats, zero-day vulnerabilities and new types of regulatory compliance configuration audit files. Tenable constantly analyzes information from unique sensors, delivering continuous visibility and critical context, and enabling decisive action that transforms a security program from reactive to proactive. Active scanning periodically examines the applications on the systems, the running processes and services, web applications and configuration settings. Passive listening provides real-time discovery of vulnerabilities on operating systems, protocols, network services, wireless devices, web applications, and critical infrastructure. SecurityCenter CV™ provides an organization with the most comprehensive view of the network and actionable information to support mitigation efforts and reduce cyber risk. Tenable enables powerful, yet non-disruptive, continuous monitoring that will provide organizations with the information needed to reduce risk within the enterprise.
Listed below are the included components:
- Vulnerability Top Ten - Top 10 Remediations - This table displays the top 10 remediations for the network. For each remediation, the risk reduction for the network if the remediation is implemented is shown, along with the number of hosts affected. The list is sorted so that the highest risk reduction is at the top of the list. Implementing the remediations will decrease the vulnerability of the network.
- Vulnerability Top Ten - Top 10 Exploitable Vulnerabilities - This table displays the top 10 exploitable vulnerabilities on the network. The list is sorted so that the most critical vulnerability is at the top of the list. For each vulnerability, the severity and the number of hosts affected is shown.
- Vulnerability Top Ten - Top 10 Most Vulnerable Hosts - This table displays the 10 hosts on the network that have the greatest number of exploitable critical and high severity vulnerabilities. The list is sorted so that the most vulnerable host is at the top of the list. For each host, a bar graph of its critical and high severity vulnerabilities are shown.
- Vulnerabilities Discovered (Last 30 Days) - This component displays vulnerability tracking information for the last 30 days. Information on Critical, High, and Medium severity vulnerabilities discovered in the past 30 days is presented, including the number of vulnerabilities that have been mitigated, number of vulnerabilities still unmitigated, number of unmitigated vulnerabilities that are exploitable, and the percentage of unmitigated vulnerabilities that are exploitable. This information can assist in assessing how well cybersecurity vulnerabilities are being managed.
- Daily Host Alerts Trend (Last 5 Days) - This component presents a line graph of Daily_Host_Alert events by time for the last 5 days.
- Netflow by Port (Last 72 Hours) - This chart displays the top 10 TCP ports with the highest session counts. This information can assist in understanding and monitoring the dataflows and services active on the network. Note that this component requires the Tenable NetFlow Monitor (TFM) LCE client.
- Top 100 Users Generating Events (Last 72 Hours) - This table displays the top 100 users generating events on the network, with trending. This information can assist in monitoring the users accessing the network.
- Malware Detections - This matrix displays various indications of malware and malicious cybersecurity events on the network. Red indicators signify that activity of high severity has occurred.
- Network Changes - This matrix displays various indications of network changes over the last 72 hours. Green indicators signify that a change has occurred, and further investigation may be warranted to determine if the change was authorized.
- Potential Suspicious Activity - This matrix displays various indications of network activity over the last 72 hours that departs from the baseline or may otherwise be suspicious. Spikes in event rates can indicate new applications, new types of network usage, and in some cases, abuse. Green indicators signify that the activity has occurred, and further investigation may be warranted to determine if the activity is authorized.
- Potential Data Loss - This matrix displays various indications of potential for data leakage and loss. Red indicators signify that activity of high severity has occurred. Green indicators signify that activity that has the potential for data loss has occurred and further investigation may be warranted.
- Compliance Summary - Check Result Ratio - This component provides a ratio view of systems that have been checked for a variety of compliance standards. The ratio bar provides a visual of the number of compliance checks that have either passed, failed, or that require some manual verification.